Sciweavers

1855 search results - page 144 / 371
» Composing model programs for analysis
Sort
View
SLP
1993
110views more  SLP 1993»
15 years 4 months ago
Logic Program Specialisation With Deletion of Useless Clauses
In this paper we describe a method of programspecialisation and give an extended example of its application to specialisation of a refutation proof procedure for rst order logic. ...
D. Andre de Waal, John P. Gallagher
PEPM
2007
ACM
15 years 9 months ago
Lowering: a static optimization technique for transparent functional reactivity
Functional Reactive Programming (frp) extends traditional functional programming with dataflow evaluation, making it possible to write interactive programs in a declarative style...
Kimberley Burchett, Gregory H. Cooper, Shriram Kri...
123
Voted
ACSE
1996
ACM
15 years 7 months ago
Literate programming as an aid to marking student assignments
In a university climate that sees rising student-sta ratios and increasing workloads for academics, any mechanism that reduces the student marking and assessment process must be w...
A. J. Hurst
IJNSEC
2008
150views more  IJNSEC 2008»
15 years 3 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
ICDM
2002
IEEE
143views Data Mining» more  ICDM 2002»
15 years 8 months ago
A Hybrid Approach to Discover Bayesian Networks From Databases Using Evolutionary Programming
This paper describes a novel data mining approach that employs evolutionary programming to discover knowledge represented in Bayesian networks. There are two different approaches ...
Man Leung Wong, Shing Yan Lee, Kwong-Sak Leung